Attacks/Breaches
10/11/2016
04:10 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
100%
0%

Symantec Warns Of Second Group Targeting SWIFT Network

Those behind the Odinaff Trojan are using tools and infrastructure associated with the infamous Carbanak cybercrime group, security vendor says

Cybersecurity firm Symantec Corp. this week identified a group of malicious hackers targeting the SWIFT payments network in the same manner that another group did earlier this year when looting tens of millions of dollars in brazen online bank heists.

Since January this year, the newly identified group has been using a sophisticated Trojan called Odinaff to try and break into the networks of multiple organizations, many of them in the financial services and banking sectors. Organizations providing support services to these companies have also been targeted.

Evidence gathered about the Odinaff group shows that it has mounted attacks on users of SWIFT, Symantec said.

The Odinaff attacks are similar to those carried out by a cybercriminal group that stole $81 million from the Bangladesh central bank earlier this year by exploiting weaknesses in the interface between the banks’ systems and the SWIFT network.

In the earlier attacks, the threat actors used tools, associated with a cybercrime group called Lazarus, to initiate fraudulent money transfer transactions from target banks and then later to conceal evidence of the illegal activity. The same attacks were played out across multiple banks, resulting in considerable millions of dollars in losses for the target banks.

Symantec said it has found evidence showing the Odinaff group targeting SWIFT users as well as using malware to conceal fraudulent transactions. “The tools used are designed to monitor customers’ local message logs for keywords relating to certain transactions,” it said. “They will then move these logs out of customers’ local SWIFT software environment,” to conceal evidence of illegal activity.

Despite the similarity in approach, there is nothing to suggest that the Odinaff group is linked to the group that carried out the earlier attacks on the Bangladesh bank and other financial institutions, Symantec said.

The security vendor described Odinaff as malware used in the initial phase of an attack to gain a foothold on a target system and to provide a persistent presence on it. The malware is being used to install other sophisticated tools on compromised systems.

At least some of the tools and the rogue infrastructure that the Odinaff group is using are similar to tools used by the infamous Carbanak group that has long targeted financial institutions. “This new wave of attacks has also used some infrastructure that has previously been used in Carbanak campaigns,” Symantec said in its alert.

The Odinaff attacks that Symantec investigated appeared to require a large degree of hands-on effort and the deployment of purpose-built back doors and tools to target computers of specific interest to the operators of the campaign. The attackers appear to have invested heavily in developing, deploying, and coordinating the use of multiple tools during targeted attacks, Symantec said.

Jon DiMaggio, senior threat intelligence analyst with Symantec Security Response, says there are multiple similarities between the Odinaff and Carbanak operations to suggest a link between the two.

Aside from similar targets, three command-and-control (C&C) IP addresses have been connected to previously reported Carbanak campaigns, he says. One of them was used in an intrusion at Oracle’s MICROS POS network earlier this year - an attack that was linked to Carbanak. Russian and Cyrillic text in certain strings of the malware also suggest the operators of the two groups have the same origins, DiMaggio says.

“The Odinaff attackers could be part of Carbanak, but it is also possible that the two groups are only loosely affiliated.”

Related stories:

 

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.